Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe
-
Size
126KB
-
MD5
fc8bf67ecb8852715717ca8a3a14e6bd
-
SHA1
766b5fcac2da1a0e29de56024d1abcadfd6a0250
-
SHA256
7cf74d0662e88b1b161022697b2fdcf1e9df70b2a4778857bf8c7051ec5634c0
-
SHA512
91db4e291ba5fc6481cd1f902a6d086a03c3412f8cb40fbb42a9d1a1caabc3657932eb255b758b386b97972b7b291d416513aaf2f3ad7e80db09a0e25ed26764
-
SSDEEP
1536:pTWhwiiehaL5o7F4iKEFXvx9oFqWGVYL41YILk:pEvrwL5oJ/XU3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2328 cmd.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1808 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 WINWORD.EXE 1808 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1808 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1808 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1808 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1808 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2328 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2328 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2328 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2328 2684 fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe 31 PID 1808 wrote to memory of 2800 1808 WINWORD.EXE 33 PID 1808 wrote to memory of 2800 1808 WINWORD.EXE 33 PID 1808 wrote to memory of 2800 1808 WINWORD.EXE 33 PID 1808 wrote to memory of 2800 1808 WINWORD.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\fc8bf67ecb8852715717ca8a3a14e6bd_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bbd2005f4c6ee5151995b54f8e24caa6
SHA1ba63dd09b33d436d66db44e610641b74453b5fe0
SHA256b9c4c9f58193a4d486f2a4d536e5dd201d7cfb562508b59a0ac9443f49261d5f
SHA512c3d76efb4699c361c9d8611b164a0b51fdbced14ae24d7b4ca6f23d3130e5a8dbc094ba3f69e52cf941f42704b61098b5f39ddcc1ad6373ef36927e3361520da
-
Filesize
19KB
MD511b155b93212d4e9a5927f32566eebb6
SHA1f57e274ed5407d4aee94faf49e62ba8bf7a26fbc
SHA256a3656ed527ee56a1d041d0e171823502c3a2d37c9821d57f3f4b5a13b8e6b726
SHA51243652f74a1c4be44cedd38e89596b5d6c002b7008abe47f3898ffcea40bfbd09e85b3f783e6963f42c5ab38ec8d3190153a3d240d8b973eb25968babef07d2c6